BMClogo

What if the AI ​​agent can localize the root cause, prove the candidate fix through automatic analysis and testing, and proactively rewrite the relevant code to eliminate the entire vulnerability class, and then open upstream patches for review? Google DeepMind Introduction to CodeMendera workflow generation, validation and upstream AI proxy that uses Gemini’s “deliberate” reasoning and tool modulation, generate, validate, and upstream fix real-world vulnerabilities. During a six-month on-premises, CodeMender contributed 72 security patches in an open source project, including a code base of about 4.5 million lines designed to react to actions (patch known issues) and initiatives (rewrite code to remove vulnerability classes).

Understand the architecture

Verify pipelines and population gates

DeepMind emphasizes automatic verification before any human touch patch: system tests for root cause fixes, functional correctness, lack of regression and style compliance; only high confidence patches were proposed for maintainer review. This workflow is clearly related to Gemini Deep Think’s plan-centric reasoning, code search results, and test results.

Active hardening: Compiler-level defender

In addition to patching, CodeMender also applies security transformations at scale. Example: Automatically insert Clang -fbounds-safety Comments libwebp To perform compiler-level bounds checking – One way to neutralize 2023 libwebp Heap overflow (CVE-2023-4863) is utilized in zero-click iOS chains and is similar to buffer/subjected with annotation applied.

Case study

DeepMind details Two non-trivial fixes: (1) a crash originally marked as a heap overflow, which tracks incorrect XML stack management; (2) a lifetime error, requiring editing of a custom C code generator. In both cases, the patches generated by the agent were automatically analyzed and a LLM judge’s examination of functional equivalence was performed before the proposal.

Google’s broader announcement framework, CodeMender, is part of the defensive stack, which includes a new AI vulnerability reward program (merging AI-related bounties) and Secure AI Framework 2.0 for proxy security. The post reiterates motivation: As an AI-driven vulnerability discovery scale (e.g., via Bigsleep and Oss-Fuzz), automatic remedial measures must be expanded in series.

CODEMENDER operates the Gemini Deep Think Plus program analysis tool (static/dynamic analysis, fuzzy, SMT) to locate the root cause and propose patches that pass automatic verification before human review. Reported early data: In six months, 72 upstream security fixes across open source projects, including about 4.5 million lines of code base. The system also uses active hardening (e.g., compiler-strengthening boundaries via clang -fbounds-safety) Reduce memory security error classes, not just patch instances. Latency or throughput benchmarks have not been published yet, so the impact is measured by validated fixes and hardened code scope.


Check Technical details. Check out ours anytime Tutorials, codes and notebooks for github pages. Also, please stay tuned for us twitter And don’t forget to join us 100K+ ml reddit And subscribe Our newsletter. wait! Are you on the telegram? Now, you can also join us on Telegram.


Asif Razzaq is CEO of Marktechpost Media Inc. As a visionary entrepreneur and engineer, ASIF is committed to harnessing the potential of artificial intelligence to achieve social benefits. His recent effort is to launch Marktechpost, an artificial intelligence media platform that has an in-depth coverage of machine learning and deep learning news that can sound both technically, both through technical voices and be understood by a wide audience. The platform has over 2 million views per month, demonstrating its popularity among its audience.

🙌Follow Marktechpost: Add us as the preferred source on Google.

Source link